Manual do usuário Allied Telesis x908

Manual para o dispositivo Allied Telesis x908

Dispositivo: Allied Telesis x908
Categoria: Comutador
Fabricante: Allied Telesis
Tamanho: 0.21 MB
Data de adição: 3/12/2013
Número de páginas: 21
Imprimir o manual

Baixar

Como usar?

Nosso objetivo é fornecer-lhe o mais rapidamente possível o acesso ao conteúdo contido no manual de instruções para Allied Telesis x908. Usando a pré-visualização online, você pode visualizar rapidamente o índice e ir para a página onde você vai encontrar a solução para seu problema com Allied Telesis x908.

Para sua conveniência

Se a consulta dos manuais Allied Telesis x908 diretamente no site não for conveniente para você, você tem duas soluções possíveis:

  • Visualização em tela cheia - Para visualizar facilmente o manual do usuário (sem baixá-lo para seu computador), você pode usar o modo de tela cheia. Para começar a visualização do manual Allied Telesis x908 no modo de tela cheia, use o botão Tela cheia.
  • Download para seu computador - você também pode baixar o manual Allied Telesis x908 em seu computador e mantê-lo em suas coleções. No entanto, se você não quer perder espaço no seu dispositivo, você sempre pode baixá-lo no futuro a partir de ManualsBase.
Allied Telesis x908 Manual de instruções - Online PDF
Advertisement
« Page 1 of 21 »
Advertisement
Versão para impressão

Muitas pessoas preferem ler os documentos não na tela, mas na versão impressa. A opção de imprimir o manual também foi fornecida, você pode usá-la clicando na hiperligação acima - Imprimir o manual. Você não precisa imprimir o manual inteiro Allied Telesis x908, apenas as páginas selecionadas. Respeite o papel.

Resumos

Abaixo você encontrará previews do conteúdo contido nas páginas subseqüentes do manual para Allied Telesis x908. Se você deseja visualizar rapidamente o conteúdo das páginas subseqüentes, você pode usá-los.

Resumos do conteúdo
Resumo do conteúdo contido na página número 1

TM
AlliedWare Plus OS
How To | Configure Hardware Filters on SwitchBlade x908,
x900-12XT/S, and x900-24 Series Switches
Introduction
The SwitchBlade x908, x900-12XT/S, and x900-24 series switches support a powerful
hardware based packet-filtering facility.
These switches can filter on a range of Layer 2, Layer 3, and Layer 4 packet attributes, and
perform a variety of different actions on the packets that match the filters.
Because the filters are hardware-based, they put no load on the CPU o

Resumo do conteúdo contido na página número 2

Introduction Contents Introduction .............................................................................................................................................. 1 Which products and software version does this Note apply to? ......................................... 2 Creating hardware ACLs ....................................................................................................................... 3 Creating IP hardware ACLs ............................................

Resumo do conteúdo contido na página número 3

Creating hardware ACLs Creating hardware ACLs Hardware ACLs contain both the match criteria and the action to take on matching traffic. There are two types of hardware ACL: IP address and MAC address. These are indexed by their ID number. IP hardware ACLs have a number in the range 3000 to 3699 and MAC hardware ACLs have a number in the range 4000 to 4699. The following table shows the available ACL ranges as displayed by the ? help, and highlights the hardware ACLs. Number range Description

Resumo do conteúdo contido na página número 4

Creating hardware ACLs IP packets You can filter IP packets on the basis of their source and/or destination IP addresses. The command syntax is: awplus(config)#access-list <3000-3699> ip The source and destination IP addresses can be any of the following: a subnet. To specify this, enter the address and mask. You can specify the mask in slash notation or with a wildcard (reverse) mask: awplus(config)#access-list 3000 permit ip 192.168.0.

Resumo do conteúdo contido na página número 5

Creating hardware ACLs TCP and UDP You can filter TCP and UDP packets on the basis of: packets source IP address and/or destination IP address (using the same syntax as when filtering IP packets) source and/or destination TCP/UDP ports. The command syntax is: awplus(config)#access-list <3000-3699> {tcp|udp} [{eq|gt|lt|ne|range} []] [{eq|gt|lt|ne|range} []] To determine which ports to

Resumo do conteúdo contido na página número 6

The effects of the action keywords in ACLs Creating MAC address hardware ACLs MAC address hardware ACLs filter packets on the basis of their source or destination MAC address. The command syntax is: awplus(config)#access-list <4000-4699> The source and destination MAC addresses can be any of the following: a range of MAC addresses. To specify this, enter a MAC address and the mask. Specify the mask as a wildcard mask: awplus(config)#ac

Resumo do conteúdo contido na página número 7

Making filters by applying hardware ACLs to ports Making filters by applying hardware ACLs to ports You can create a filter by simply applying one or more ACLs to a port, as long as you can select the matching traffic through hardware ACL keywords, as described above. ACLs can be applied to switch ports and static channel groups. To apply an ACL to a dynamic (LACP) channel group, apply the ACL to all ports that can be in the channel group. The hardware filters act on incoming traffic, so apply

Resumo do conteúdo contido na página número 8

Making filters by using QoS class-maps Making filters by using QoS class-maps QoS class-maps allow you to match on a much wider range of packet attributes than ACLs by themselves. They do this by determining the match criteria from an ACL, or from match commands, or from both in combination. Also, they use an ACL to decide what action to take on a packet, unless you want the default action of permit. The following figure summarises the class-map logic flow. Note that a class-map with no mat

Resumo do conteúdo contido na página número 9

Making filters by using QoS class-maps 3. Specify what the class-map will match on (see page 9). This involves: attaching the ACL to the class-map using other match commands to further limit what the traffic will match the class-map (unless the ACL’s settings were enough) 4. Attach the class-maps to a policy-map (see page 12). 5. Attach the policy-map to the ingress port or ports (see page 12). The following sections describe how to do each of these steps (except creating ACLs—that’s describ

Resumo do conteúdo contido na página número 10

Making filters by using QoS class-maps Matching on “inner” keywords for nested VLANs The match tpid, match inner-tpid, match inner-vlan, and match inner-cos commands all apply to nested VLAN configuration. In this situation, the packets arriving at the core-facing port can have two VLAN tags configured on them. The match tpid command matches on the first Tag Protocol Identifier field in the packet. The match inner-tpid command matches on the TPID in the second 802.1Q tag in the packet. The

Resumo do conteúdo contido na página número 11

Making filters by using QoS class-maps Matching on TCP flag Unlike the other match commands, you can match on multiple TCP flags. The switch combines the specified flags by ANDing them together. To specify the multiple flags, either make multiple match tcp-flags commands or specify the flags in one command as a space- separated list. For example, the following series of commands will match on a packet that has all of ACK, SYN and FIN set: awplus(config)#class-map tcp-flags awplus(config-cmap)

Resumo do conteúdo contido na página número 12

Making filters by using QoS class-maps Matching on eth-format and protocol Ethernet format and protocol are specified together, as a pair. You can either specify the command as: match eth-format protocol or match protocol eth-format The switch allows you to match on any of the Ethernet formats, as the following output shows: awplus(config-cmap)#match eth-format ? 802dot2-tagged 802.2 Tagged Packets 802dot2-untagged 802.

Resumo do conteúdo contido na página número 13

The logic of the operation of the hardware filters The logic of the operation of the hardware filters The operation of the filters follows the standard ACL logic: if a packet matches an ACL on the port, the comparison process stops and the action attached to the ACL is performed. The switch checks ACLs in the order in which you attach them to the port. For example, to reject all multicast traffic except 236.5.8.213, make one ACL to permit that address and another ACL to deny all multicast tr

Resumo do conteúdo contido na página número 14

Examples Examples Blocking all multicast traffic This example uses an interface ACL with an action of deny. Consider a situation where multiple clients are attached to the switch, with each client attached to a different port. Each client has a specific service, which includes a set of allowed traffic types. The client on port 1.0.10 is using a service that does not allow any multicast packets to be sent. To configure this: 1. Create an ACL to match and deny all packets with a multicast desti

Resumo do conteúdo contido na página número 15

Examples Blocking all multicast traffic except one address This example uses two interface ACLs, one with an action of permit and one with an action of deny. Use this type of configuration when you want to discard a wide range of traffic but want to forward a subset of traffic within that range. Consider a situation where you want to prevent the forwarding of multicast traffic in general, but wish to support an application that needs to send packets to one particular multicast address (236.5

Resumo do conteúdo contido na página número 16

Examples Mirroring ARP packets This example uses a QoS class-map. Use this type of configuration when you want to mirror a subset of the incoming traffic on a port, and you need to use QoS match commands to select the mirrored traffic. Consider a situation where you want to capture ARP packets that arrive at port 1.0.10. To configure this: 1. Set port 1.0.20 as the mirror port. To do this, enter global configuration mode and use the commands: awplus(config)#interface port1.0.20 awplus(config-

Resumo do conteúdo contido na página número 17

Examples Blocking TCP sessions in one direction This example uses two QoS class-maps. Administrators often want to block the establishment of TCP sessions in one direction, but allow TCP sessions to be established in the opposite direction. To do this, it is necessary to block the very first packet of an outgoing TCP session from being forwarded, but to allow any packets that reply to the initiation of an incoming TCP session to be forwarded. The very first packet of a TCP session has the SYN

Resumo do conteúdo contido na página número 18

How many filters can you create? How many filters can you create? The total number of filters that can be created is not an exact number, but depends on which fields the various filters are matching on. So, to understand how to work out whether the set of filters you are creating might run out of space, it is necessary to understand the way in which the filters operate in the switch hardware. There are two items within the switch hardware which set limits on the number of filters that can be

Resumo do conteúdo contido na página número 19

How many filters can you create? 2. The profile (mask) The other item is called the profile. Conceptually, this is a 16-byte mask that decides which set of bytes should be extracted from a packet as it enters the filtering process, to be compared against all the interface ACLs and the QoS class-maps. All filters share a single mask. In effect, the mask is the sum of all the individual bytes required for each individual ACL or QoS match command. The number of bytes required by each ACL or mat

Resumo do conteúdo contido na página número 20

How many filters can you create? Are there enough bytes for your set of filters? Of course, the mask cannot increase without limit—it has a maximum size of 16 bytes. When it reaches the 16-byte limit, no more ACLs or QoS match commands can be created which would cause the mask to increase in size. The switch can still accept ACLs or QoS match commands that use fields that have already been included in the mask. There is no particular number of ACLs or QoS match commands that will cause the mas


Manuais similares
# Manual do usuário Categoria Baixar
1 Allied Telesis x908 Manual de instruções Acessórios para computador 0
2 Allied Telesis X908 Manual de instruções Roteador 2
3 Allied Telesis 24i Manual de instruções Comutador 24
4 Allied Telesis AT -8000S/24 Manual de instruções Comutador 182
5 Allied Telesis 8100S Manual de instruções Comutador 28
6 Allied Telesis 4000 Series Manual de instruções Comutador 9
7 Allied Telesis 48W Manual de instruções Comutador 5
8 Allied Telesis AT -8000S/48 Manual de instruções Comutador 33
9 Allied Telesis 86241-06 Manual de instruções Comutador 0
10 Allied Telesis 613-001480 Manual de instruções Comutador 4
11 Allied Telesis 8PS Manual de instruções Comutador 1
12 Allied Telesis AT-8100L/8POE Manual de instruções Comutador 3
13 Allied Telesis AT-8100S/24F-LC Manual de instruções Comutador 0
14 Allied Telesis AT-8000GS/48 Manual de instruções Comutador 34
15 Allied Telesis AT-8100S/16F8-SC Manual de instruções Comutador 3
16 Sony 4-296-436-11 (2) Manual de instruções Comutador 0
17 3Com 10/100BASE-TX Manual de instruções Comutador 61
18 3Com 2226-SFP Manual de instruções Comutador 688
19 3Com 16985ua.bk Manual de instruções Comutador 10
20 3Com 10BASE-T Manual de instruções Comutador 4